← Library
splApache-2.0from splunk/security_content

Windows Excessive Disabled Services Event

The following analytic identifies an excessive number of system events where services are modified from start to disabled. It leverages Windows Event Logs (EventCode 7040) to detect multiple service state changes on a single host. This activity is significant as it may indicate an adversary attempting to disable security applications or other critical services, potentially leading to defense evasion or destructive actions. If confirmed malicious, this behavior could allow attackers to disable security defenses, disrupt system operations, and achieve their objectives on the compromised system.

Quality
67
FP risk
Forks
0
Views
0
Rule sourcedetections/endpoint/windows_excessive_disabled_services_event.yml
`wineventlog_system` EventCode=7040 "disabled"
  | stats count values(EventData_Xml) as MessageList dc(EventData_Xml) as MessageCount min(_time) as firstTime max(_time) as lastTime
    BY Computer EventCode UserID
  | rename Computer as dest
  | where count >=10
  | `security_content_ctime(firstTime)`
  | `security_content_ctime(lastTime)`
  | `windows_excessive_disabled_services_event_filter`